HP0-Y31 - Implementing HP Network Infrastructure Solutions

1 with a specific IPv6 global unicast address, which other IPv6 features are automatically configured on. VLAN 1? .... What is a difference between video traffic and voice traffic? ... C. translate IEEE 802.1p priority markers to ToS priority markers.
824KB taille 1 téléchargements 275 vues
HP0-Y31 - Implementing HP Network Infrastructure Solutions Number: HP0-Y31 Passing Score: 800 Time Limit: 120 min File Version: 1.0 HP0-Y31 Formated and Questions Updated for Drop and Drag Edited and Formatted By Mr. Dimebar Updated until Sept 2011 Let me know how you get on, and good luck.

Exam A QUESTION 1 What is an advantage of locating intelligent routing at the edge of an enterprise network instead of only in the core? A. The edge-oriented strategy supports VRRP and MSTP for default gateway redundancy. B. The edge-oriented strategy requires fewer VLANs and networks. C. The edge-oriented strategy simplifies route summarization because only routers must support VLANs only for directly connected users. D. The edge-oriented strategy allows traffic to traverse the network after the routing decisions have been made. Answer: D Section: (none) Explanation/Reference:

QUESTION 2 When a router must determine which route to include in its route table, when does the router use administrative distance in the decision? A. when the router has learned about multiple routes to the same destination from static configurations or different routing protocols B. when the router has learned about multiple routes from equal-cost paths to the same destination C. when the router is configured with static routes to the same destination that specify the same cost but different next hop router interfaces D. when the router has learned about multiple routes to the same destination from different sources using the same routing protocol Answer: A Section: (none) Explanation/Reference:

QUESTION 3 Which statement is true about the HP E5400 zl switch Connection-rate Filtering feature? A. It detects threats with both a signature-based engine and an anomaly-based engine that can detect zero day attacks. B. A connection-rate ACL can be used to allow some or all inbound traffic through a port that has been throttled or blocked. C. It uses sFlow traffic sampling to determine whether traffic activity represents an intrusion. D. The connection-rate filter sensitivity is configurable per port, VLAN, or link aggregation group. Answer: B Section: (none) Explanation/Reference:

QUESTION 4 Which authentication protocol provides mutual authentication for both the supplicant and the authentication server?

A. B. C. D.

Password Authentication Protocol (PAP) Challenge-Handshake Authentication Protocol (CHAP) Microsoft CHAP version 2 (MS-CHAPv2) Extensible Authentication Protocol (EAP)-Message Digest 5 (MD5)

Answer: C Section: (none) Explanation/Reference:

QUESTION 5 Your CIO wants you to investigate IT defense in depth. What does this mean? A. B. C. D.

You need to purchase a deep-packet inspection Intrusion Prevention System (IPS). You need to upgrade your firewalls to next-generation firewalls. You need to plan a comprehensive strategy that addresses security at many layers. You need to leverage the network infrastructure built-in security features rather than look for appliancebased solutions.

Answer: C Section: (none) Explanation/Reference:

QUESTION 6 Which RADIUS packet includes the Attribute Value Pairs (AVPs) that are applied to customize a user connection? A. B. C. D.

Access-Update Access-Request Accounting-Request Access-Accept

Answer: D Section: (none) Explanation/Reference:

QUESTION 7 Which mechanism enables two parties to agree on a symmetric key on their own without transmitting it over the network? A. B. C. D.

Kerberos Key Distribution Center (KDC) Diffie-Hellman exchange Public Key Infrastructure (PKI)

Answer: C Section: (none)

Explanation/Reference:

QUESTION 8 A company's help desk requests access to the web interface of various networking devices. The network administrator decides to implement a secure web interface using SSL. Which step is necessary to complete this task on an HP E5400 zl switch? A. B. C. D.

import the certificate authority certificate configure RADIUS for user login generate a self-signed certificate enable SSH

Answer: C Section: (none) Explanation/Reference:

QUESTION 9 What is one security challenge that is specifically addressed by dynamically refreshing encryption keys? A. B. C. D.

Users forget their passwords and forget how to connect. Hackers are more likely to crack a key when they have many frames encrypted with that key. Asymmetric keys, which are more secure than symmetric keys, must be distributed dynamically. Static encryptions keys can protect data's privacy, but not its integrity.

Answer: B Section: (none) Explanation/Reference:

QUESTION 10 You must configure an HP E5406 zl switch to be the Owner of a VRID associated with VLAN 20. What must be true of the virtual IP address for the VRID? A. B. C. D.

It must use an address on a multi-netted VLAN interface. It must match the router's address on the VLAN 20 interface. It must use a classless address. It must match the address assigned to VLAN 20 on the Backup router.

Answer: B Section: (none) Explanation/Reference:

QUESTION 11 How does the Virtual Router Redundancy Protocol (VRRP) improve network availability? A. by providing redundant links between edge and core layers B. by providing redundant connections to the Internet C. by providing backup default gateways for client devices

D. by supporting the configuration of redundant gateways on VRRP-enabled clients Answer: C Section: (none) Explanation/Reference:

QUESTION 12 You must provide the capability for the Virtual IP address to be pinged if the Backup router assumes the Master role when the Owner router fails. What is necessary to ensure this operation? A. B. C. D.

E8206(config)# router vrrp virtual-ip-ping E8206(config)# vrrp 10 virtual-ip-ping E8206(config)# router virtual-ip E8206(config)# router ospf ip-ping

Answer: A Section: (none) Explanation/Reference:

QUESTION 13 You must configure four HP E8212 zl switches and six HP E5406 zl switches to support Multiple Instance Spanning Tree (MSTP) on a network. What must you do to ensure that all the switches join the same MST region? A. B. C. D.

Configure the switches with identical Uplink Priorities for common switch-to-switch links. Configure Bridge Priorities on each switch so that all MST instances have a different Root Bridge. Configure the switches with identical config-names, config-revisions, and VLAN-to-instance mappings. Configure all switch-to-switch links in each MST instance as tagged members of all VLANs.

Answer: C Section: (none) Explanation/Reference:

QUESTION 14 When the following command is issued at the CLI of an HP E5400 zl switch at factory default settings, which Spanning Tree version is enabled? E5406(config)# spanning-tree A. B. C. D.

STP+ PVST+ MSTP RSTP

Answer: C Section: (none) Explanation/Reference:

QUESTION 15 Which default gateway redundancy protocol is supported on HP E5400 zl switches? A. B. C. D.

XRRP HSRP VRRP FSRP

Answer: C Section: (none) Explanation/Reference:

QUESTION 16 An administrator has been tasked with implementing a dynamic port ACL on an HP E5400 zl Series switch. Which statements are true? (Select two.) A. B. C. D. E.

It can be implemented as either a standard or extended ACL. It filters switched IP traffic either inbound or outbound on a designated port. It requires the use of 802.1X, Web, or MAC authentication services on the switch. It is used where clients with differing access needs are likely to use the same port. Configuration of the ACL is done on the switch and then read dynamically by a RADIUS server when a user connects. F. It can be applied to either a single physical port or to a link aggregation group. Answer: CD Section: (none) Explanation/Reference: Explanation:

QUESTION 17 An administrator needs to create an ACL to block traffic from 192.168.10.23 to 192.168.10.100, which are on the same subnet. Which type of ACL can be used to meet this need? A. B. C. D.

a standard ACL applied as Routed ACL (RACL) an extended ACL applied as a Routed ACL (RACL) a standard ACL applied as a VLAN ACL (VACL) an extended ACL applied as a VLAN ACL (VACL)

Answer: D Section: (none) Explanation/Reference:

QUESTION 18 Routed ACLs (RACLs) can be used to filter traffic on an HP E5400 zl switch. Which traffic is inspected? A. routed IP traffic arriving on one VLAN and leaving through another VLAN B. switched IP traffic moving between ports belonging to the same VLAN

C. IP traffic entering a physical port, port list, or static trunk D. switched IP traffic moving between ports belonging to the same subnet of a multinetted VLAN Answer: A Section: (none) Explanation/Reference:

QUESTION 19 You have an HP Networking Switch E5400 zl that has two configured VLANs. VLAN 100 has an IP address range of 10.1.100.0/24 and is where the servers reside. VLAN 36 has an IP address range of 10.1.36.0/24 and is where the network clients reside. You configure an ACL with the following entries: permit tcp 10.1.36.0 0.0.0.0 10.1.100.10 255.255.255.255 eq ftp permit tcp 10.1.36.0 0.0.0.0 10.1.100.10 255.255.255.255 eq https permit tcp 10.1.36.0 0.0.0.0 10.1.100.10 255.255.255.255 eq ssh When you apply this ACL statically to ports in VLAN 36, what is the effect on the clients located in VLAN 36? A. B. C. D.

They have no access because the ACL is misconfigured. They cannot access anything in the 10.1.100.0 subnet because IP has not been specified in the ACL. They are allowed only FTP, HTTPS, and SSH access to 10.1.100.10, but no access elsewhere. They are allowed only FTP, HTTPS, and SSH access to 10.1.100.10, but full access to everything else in the 10.1.100.0 subnet.

Answer: C Section: (none) Explanation/Reference:

QUESTION 20 HP E5400 zl switches have the ability to mirror traffic from one switch to another. Which action should you take when implementing remote mirroring? A. B. C. D.

Configure a connection-rate filter. Enable the instrumentation monitor. Enable jumbo frames. Enable a bandwidth limit.

Answer: C Section: (none) Explanation/Reference:

QUESTION 21 Click the Exhibit button.

In the network shown in the exhibit, the routers have been configured with the IP addresses shown in the table, and OSPF has been started. All the networks to which these three routers are connected have been configured in Area 0. Additionally, the following commands have been entered: Router B interface gigabit 0/0 ospf dr-priority 0 quit Router C interface gigabit 0/0 ospf dr-priority 0 quit. What will be the final state of the peer relationship between Routers A and C? A. B. C. D. E.

Partial Full Two-way Established Open

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 22 Click the Exhibit button.

Which router creates LSA type 2 external routes? A. B. C. D.

0.0.0.1 4.0.0.1 1.0.0.2 0.0.0.5

Answer: A Section: (none) Explanation/Reference:

QUESTION 23 Which OSPF network type sends its packets to unicast addresses instead of multicast addresses? A. B. C. D.

Broadcast NBMA P2P P2MP

Answer: B Section: (none) Explanation/Reference:

QUESTION 24 Click the Exhibit button.

Which router pair should be connected with a virtual link? A. B. C. D.

0.0.0.1 and 0.0.0.4 4.0.0.1 and 3.0.0.2 0.0.0.6 and 3.0.0.2 0.0.0.3 and 0.0.0.4

Answer: C Section: (none) Explanation/Reference:

QUESTION 25 Click the Exhibit button.

You are in the process of configuring IPv6 and OSPFv3 on a network. After configuration you are unable to see the neighbor router. According to the exhibit, which command is missing from the configuration? A. B. C. D.

ipv6 router enable ospfv3 router enable router ospf3 enable ipv6 ospf3 router enable

Answer: C Section: (none) Explanation/Reference:

QUESTION 26 While configuring IPv6 support on an HP E5400 zl switch, you must also provide routing of IPv6. In addition to IPv6 commands on specific VLANs, which additional global configuration statement is required? A. B. C. D.

ipv6 anycast-routing ip unicast-routing ipv6 unicast-routing ipv6 multicast-routing

Answer: C Section: (none) Explanation/Reference:

QUESTION 27 You are troubleshooting an issue where hosts are not obtaining their DHCPv6 addresses. You check the HP E5400 zl switch config and observe the ipv6 helper address is defined on the user VLAN, as well as the appropriate M and O bit parameters. However, trace analysis indicates that the switch is not sending the

DHCPv6 request out the VLAN where the DHCPv6 server is located. Which additional configuration parameter is required on the HP 5400 zl switch in order to support DHCPv6? A. B. C. D.

E5406(config)# dhcp-relay E5406(config)# ipv6 helper-address E5406(config)# dhcpv6-relay E5406(config)# ipv6 dhcpv6-relay

Answer: C Section: (none) Explanation/Reference:

QUESTION 28 You are configuring an HP E5400 zl switch for IPv6 to be used as a core router. When you configure VLAN 1 with a specific IPv6 global unicast address, which other IPv6 features are automatically configured on VLAN 1? (Select two.) A. B. C. D. E.

VLAN 1 is enabled for IPv6 routing. VLAN 1 is assigned a link-local unicast address. VLAN 1 requires an additional IPv6 command in order to operate. VLAN 1 is enabled for IPv6 operation. VLAN 1 is assigned a global-link unicast address.

Answer: BD Section: (none) Explanation/Reference:

QUESTION 29 IPv6 Router Advertisement Messages are sent to which IPv6 multicast address? A. B. C. D.

FFFF::1 FF00::1 FF02::1 FF02::2

Answer: C Section: (none) Explanation/Reference:

QUESTION 30 You are implementing a new network infrastructure using only IPv6 on HP 5400 zl switches. You currently have two switches connected to each other, each configured with only the default VLAN, and IPv6 is enabled. The IPv6 address of the switch you want to ping is fe80::223:47ff:fec1:6140. When you enter the ping6 command to ping that switch, you get an error message. What is the correct syntax to ping a connected host's link-local unicast address from the switch you have a console connection? A. ping6 fe80::223:47ff:fec1:6140 vlan 1 B. ping6 fe80::223:47ff:fec1:6140 C. ping fe80::223:47ff:fec1:6140%vlan

D. ping6 fe80::223:47ff:fec1:6140%vlan1 Answer: D Section: (none) Explanation/Reference:

QUESTION 31 What is the correct format for an IPv6 mixed notation URL that you would enter into a browser on an IPv6based client? A. B. C. D.

http://2001:db8:1:10:1:2:3:2ad5:2836/webpage.html http://2001:db8:1:10:1:2:3:2ad5-2836/webpage.html http://[2001:db8:1:10:1:2:3:2ad5]:2836/webpage.html http://[2001:db8:1:10:1:2:3:2ad5]-2836/webpage.html

Answer: C Section: (none) Explanation/Reference:

QUESTION 32 You are onsite implementing a basic IPv6 network configuration. You have configured an HP E5400 zl switch for IPv6 static addressing and IPv6 routing. You connect another HP E5400 zl switch to be used at the edge and enter the following command at the configuration CLI: edge_switch(vlan-1)# ipv6 address autoconfig. Which types of IPv6 addresses will be automatically generated on this edge switch? (Select two.) A. B. C. D. E.

a link-local unicast address a link-local multicast address a global anycast address a global unicast address a global multicast address

Answer: AD Section: (none) Explanation/Reference:

QUESTION 33 Which statements are true about Port Security on an HP E5400 zl switch? (Select two.) A. ACLs can be used to apply the same Port Security Policy to more than one port. B. Port Security can be concurrently active with MAC Lockout on a switch if the same MAC addresses are configured. C. Port Security can be configured to monitor the connection rate of the connected device and disable the port if a threshold is exceeded. D. The default operating mode is continuous, which allows any device to access a port without causing a security response. E. It includes eavesdrop protection, which prevents use of a port for flooding unicast packets addressed to MAC addresses unknown to the switch.

Answer: DE Section: (none) Explanation/Reference:

QUESTION 34 Why are IP and Ethernet fundamental technologies for converged networks? (Select two.) A. B. C. D. E.

They offer very high levels of security. They are only available on Intel-based computers. They are not disrupted by power outages. They offer long-used and mature standards. They are widely deployed in LANs.

Answer: DE Section: (none) Explanation/Reference:

QUESTION 35 How is VoIP more sensitive to network congestion than classic file and print data applications? A. B. C. D.

VoIP requires more speed than data applications. VoIP requires dedicated switched virtual circuits to provide adequate voice quality. VoIP depends on frequent multicast broadcasts to maintain location and inventory information. VoIP requires that packets be transmitted and received at predictable and fixed intervals.

Answer: D Section: (none) Explanation/Reference:

QUESTION 36 How does the HP Networking Adaptive EDGE Architecture support convergence? A. B. C. D.

by supporting IEEE 802.1Q switch-to-switch only connections by supporting a variety of Layer 3 protocols only in the core of the network by enhancing edge compression of voice and video streams by supporting enhanced traffic prioritization at the edge of the network

Answer: D Section: (none) Explanation/Reference:

QUESTION 37 Which advantages do converged networks offer? (Select two.) A. automatic support for IPv4 and IPv6

B. C. D. E.

simplified adds, moves, and changes enhanced bandwidth for voice transmissions lowered costs for switches and routers integrated support for voice, video, and data

Answer: BE Section: (none) Explanation/Reference:

QUESTION 38 What is a benefit of the HP E5400 zl switch's BPDU Protection feature? A. It stops a topology change from being sent when a port's link status changes. B. It ignores received BPDUs and does not send its own BPDUs on designated ports. C. It protects the active Spanning Tree topology by preventing spoofed BPDUs from entering the Spanning Tree domain. D. It prevents a Spanning Tree port from changing between various operational states during a broadcast storm or when a loop is detected. E. It is used to stop sending topology change notifications out a port. Answer: C Section: (none) Explanation/Reference:

QUESTION 39 An administrator has an HP A5800 switch that connects to another department. Both departments are administered separately and each is running Spanning Tree. The administrator wants to keep the other department's Spanning Tree from affecting his network. What could the administrator do to filter the BPDUs from the other network? A. B. C. D. E. F.

Implement BPDU Filtering. Disable Spanning Tree on that port only. Enable BPDU Protection. Implement Root Guard. Enable TCN Guard. Configure the port as an edge port.

Answer: B Section: (none) Explanation/Reference:

QUESTION 40 Match each QoS mechanism with its description.

Answer:

Section: (none) Explanation/Reference:

QUESTION 41 What is a difference between video traffic and voice traffic? A. B. C. D.

Streaming video traffic is typically less sensitive to delay than voice traffic. Streaming video traffic is typically less difficult to route than voice traffic. Streaming video traffic is typically more sensitive to jitter than voice traffic. Streaming video traffic is typically less bandwidth-intensive than voice traffic.

Answer: A Section: (none) Explanation/Reference:

QUESTION 42 When does an HP E5400 zl switch start sending LLDP advertisements? A. B. C. D.

when LLDP is enabled in response to an LLDP request from a neighbor when IP routing is enabled immediately after the switch has started

Answer: D Section: (none) Explanation/Reference:

QUESTION 43 You have been asked to design a prioritization scheme on the HP E5400 zl switch based on the IEEE 802.1p standard. Which 802.1p values fulfill the requirement for FTP traffic to receive low priority treatment? (Select two.) A. B. C. D. E.

0 1 2 3 4

Answer: BC Section: (none) Explanation/Reference:

QUESTION 44 You are designing a network for a mid-sized company. During one of the planning meetings you learn that the customer will be installing VoIP phones that set Layer 2 priority markers for all voice traffic. The VoIP traffic will also cross routed links to the branch offices. Which configuration features are required to ensure that the HP E5400 zl switches maintain the priorities set by the VoIP phones? (Select three.) A. B. C. D. E. F.

untagged links for all voice VLAN traffic GMB settings for voice traffic DiffServ prioritization tagged links for all voice VLAN traffic rate limiting on all ports that support VoIP phones an IEEE 802.1p-to-DSCP map for all voice traffic

Answer: CDF Section: (none) Explanation/Reference:

QUESTION 45 On an HP E5400 zl switch, which prioritization capability is enabled at default settings? A. B. C. D.

map DSCP values in the ToS field to physical queues classify traffic based on IEEE 802.1p values set by other devices translate IEEE 802.1p priority markers to ToS priority markers classify traffic according to the TCP port number

Answer: B Section: (none) Explanation/Reference:

QUESTION 46 One interface on an HP E5400 zl switch being used as an edge switch, receives traffic that uses only Layer 3 markers to indicate QoS priority. What must you do to enable the switch to forward this traffic with the correct priority through the rest of the E5400 zl network? A. B. C. D.

Set the QoS validate level to the appropriate value on the specific interface. Configure port-based priorities for all ports forwarding this traffic. Configure custom IEEE 802.1p maps for all ports forwarding this traffic. Enable the appropriate translation of the IP ToS field.

Answer: D Section: (none) Explanation/Reference:

QUESTION 47 OSPF has been enabled in the global configuration context and in the VLAN 165 context of an HP E5400 zl switch. There are two OSPF areas that have been created and associated with the correct VLANs. All other OSPF settings are at their defaults. What is the effect of the following command? E5412(vlan-165)# ip ospf cost 100 A. B. C. D.

The OSPF link using VLAN 165 as a gateway will use the highest default cost. The OSPF link using VLAN 165 will become the preferred route to the backbone area on all OSPF links. The OSPF link using VLAN 165 as a gateway will have a lower cost than OSPF links with a default cost. The OSPF link using VLAN 165 as a gateway will have a higher cost than OSPF links with a default cost.

Answer: D Section: (none) Explanation/Reference:

QUESTION 48 While configuring an HP E5400 zl switch to be an ABR for OSPF areas 0 and 2, you enter the following command at the switch's CLI: E5406(ospf)# area 2 stub 2 no-summary

How will this affect the route tables of other routers in area 2? A. B. C. D.

The only OSPF route will be the interface with the E5400. Only directly connected routes will be advertised. All networks outside area 2 will be summarized as a default route. Every route known to the E5400 will be sent with a separate cost.

Answer: C Section: (none) Explanation/Reference:

QUESTION 49 Configuring summarization on an ABR provides benefits to which routers in a network? A. B. C. D.

ABRs only ASBRs only ABRs and ASBRs ABRs and internal routers

Answer: D Section: (none) Explanation/Reference:

QUESTION 50 An administrator wants to implement a feature on his A5800 to reduce the chances that an employee can connect an unauthorized switch in a conference room to the network. The administrator decides to implement Port Security. Which configuration should you recommend? A. B. C. D.

max-mac-count = 1 and port-mode = autoLearn max-mac-count = 1 and port-mode = not defined max-mac-count = 1 and port-mode = secure max-mac-count = 2 and port-mode = secure

Answer: B Section: (none) Explanation/Reference:

QUESTION 51 When using DHCP Snooping on an HP E5400 zl switch, which action can the switch perform if a client sends a DHCP message with option 82 set? A. B. C. D. E.

It marks the source client as untrusted and forwards it to an untrusted DHCP server. It replaces the field with the switch's IP address and the source port identifier. The switch does not understand option 82 and drops the DHCP message. It authenticates the DHCP message and forwards it if the client is attached to a trusted port. It moves the client to a quarantine VLAN for further threat detection.

Answer: B Section: (none) Explanation/Reference:

QUESTION 52 You are configuring DHCP Snooping on an HP E5400 zl switch and want to replace the remote ID field when a DHCP message arrives with a preconfigured value. From which values can you choose to replace the preconfigured value? (Select three.) A. B. C. D. E. F. G.

base MAC address management IP address MAC address of the client any DHCP helper IP address IP address of an authorized server subnet IP address of source VLAN the requested IP address

Answer: ABF Section: (none) Explanation/Reference:

QUESTION 53 An administrator of a hotel wants to keep the guests of the hotel from communicating with each other on the hotel network. The network uses HP A5800 switches. Which action restricts this communication without implementing additional VLANs? A. B. C. D.

adding all guest ports to the same Port Isolation group in the same VLAN adding all guest ports to different Port Isolation groups in the same VLAN implementing DHCP-Snooping with ARP Detection configuring Port Security in the autoLearn mode

Answer: A Section: (none) Explanation/Reference:

QUESTION 54 What are acceptable topologies for an IRF-Stack? (Select two.) A. B. C. D. E.

star tree daisy-chain mesh ring

Answer: CE Section: (none) Explanation/Reference:

QUESTION 55 In an IRF stack, which operational plane is centralized (in the Master) and which is distributed (among all members)? A. Management: centralized Control: centralized Forwarding: centralized B. Management: distributed Control: distributed Forwarding: distributed C. Management: centralized Control: distributed Forwarding: distributed D. Management: distributed Control: centralized Forwarding: distributed E. Management: centralized Control: centralized Forwarding: distributed Answer: E Section: (none) Explanation/Reference:

QUESTION 56 Consider the following QoS policy configuration entered in an A-Series switch: traffic classifier class1 if-match xyz traffic behavior count accounting packet qos policy track classifier class1 behavior count interface gigabit 1/0/24 qos apply policy track inbound Which command should you use to display the accounting results? A. B. C. D.

display traffic statistic interface gigabit 1/0/24 display qos policy interface gigabit 1/0/24 display qos policy track statistic display traffic behavior count

Answer: B Section: (none) Explanation/Reference:

QUESTION 57 What are the possible destinations of traffic mirroring on an HP A5800 switch? (Select two.) A. Slot

B. C. D. E.

Interface (VLAN) Interface (Port) CPU Next-hop

Answer: CD Section: (none) Explanation/Reference:

QUESTION 58 You are designing a network for a customer, and one of the requirements is to support multicast traffic. When defining configuration steps for the HP E5400 zl switches, when will both PIM and IGMP need to be configured? A. B. C. D.

when multicasts have multiple sources when multicasts need to be routed when multicasts have high usage among end users when multicasts need to support large bandwidth

Answer: B Section: (none) Explanation/Reference:

QUESTION 59 What is the responsibility of the Bootstrap Router (BSR) in a PIM-Sparse routing domain? A. B. C. D.

maintains a PIM route table for all domain routers and multicast groups distributes associations between Rendezvous Points and multicast groups provides a boundary with PIM-Dense routing domains provides the root of multicast distribution trees for administratively defined groups

Answer: B Section: (none) Explanation/Reference:

QUESTION 60 Routing protocols such as RIPv2 and OSPF use which part of the multicast address range? A. B. C. D.

Ad-hoc MAC Address Block Local Network Control Block Internetwork Control Block Administratively Scoped Address Block

Answer: B Section: (none) Explanation/Reference:

QUESTION 61 On a customer network, one of the requirements is to support one video stream to many of their hosts. What is the most efficient mechanism to achieve this goal? A. B. C. D.

single broadcast stream from the content server into the network single multicast stream from the content server into the network multiple unicast streams from the content server into the network multiple multicast streams from the content server into the network

Answer: B Section: (none) Explanation/Reference:

QUESTION 62 Which roles are supported by the sFlow standard? A. B. C. D.

agent and collector only probe and collector only agent, collector, and analyzer probe, collector, and analyzer

Answer: A Section: (none) Explanation/Reference: Explanation:

QUESTION 63 What is one purpose of defining IP-to-MAC address bindings on an HP E5400 zl switch that has Dynamic ARP Protection enabled? A. B. C. D. E. F. G.

to specify clients connected to trusted ports to identify devices that do not use DHCP, but have a static IP address assigned to create a list of allowed DHCP clients to provide security on those ports where different clients may connect over time to create a list of clients that are permitted by Port Security when Dynamic ARP Protection is enabled to specify clients connected to untrusted ports to protect uplink ports that connect to other switches that do not support Dynamic ARP Protection

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 64 Click the Exhibit button.

In an A-Series Layer 2 switch where Port-based Multicast VLAN is being configured, which port link-type configuration must be used for the client connection ports? A. B. C. D.

Trunk - with the Multicast VLAN as the PVID Trunk - with the Multicast VLAN permitted Hybrid - with the Multicast VLAN enabled Hybrid - with the Multicast VLAN as the PVID

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 65 What does an IGMP Querier store in its Multicast Group Membership list? A. for each multicast group and each interface, the list of IGMP routers that are competing to become the IGMP DR for that subnet B. for each multicast group, the number of members (receivers) in it and an aging timer for each entry C. for each multicast group, the IP address of each member (receiver) and an aging timer for each entry D. for each multicast group, the router own interfaces where there are group membersfor each multicast group, the router? own interfaces where there are group members Answer: D

Section: (none) Explanation/Reference: Explanation:

QUESTION 66 How are IPv4 multicast addresses mapped into MAC multicast addresses? A. IGMP creates a dynamic mapping table and includes the MAC address in Query and Report messages. B. The last 24 bits of the MAC address bits are concatenated to the IPv4 multicast address after a special IPv4 address prefix. C. The complete IPv4 address is concatenated after a special MAC address prefix. D. The last 23 bits of the IPv4 multicast address are concatenated after a special MAC address prefix. Answer: D Section: (none) Explanation/Reference: Explanation:

QUESTION 67 You are a network engineer for an ISP supporting multiple customers, each having multiple sites. Most of these customers require their VLANs to span the site-to-site connections through your provider network. You have decided that QinQ would best serve your customers' needs. Which QinQ operation mode should you select for your HP E5400 zl switches that support these customers? A. B. C. D.

QinQ cvlan QinQ multivlan QinQ mixedvlan QinQ svlan

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 68 QinQ provides the capability of having two VLAN tags in a single frame, sometimes called "tag stacking." Which VLAN types does QinQ support? A. B. C. D.

2-VLAN and S-VLAN S-VLAN and M-VLAN S-VLAN and C-VLAN M-VLAN and C-VLAN

Answer: C Section: (none) Explanation/Reference:

QUESTION 69 Click the Exhibit button and open the three exhibits.

A frame belonging to VLAN 2 is transmitted from Switch A to Switch B. What happens to the frame? A. B. C. D.

It is assigned to VLAN 1. It is assigned to VLAN 2. It is assigned to VLAN 3. It is discarded.

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 70 Which header field is used by the Protocol-based VLAN mechanism to identify the protocol? A. B. C. D. E. F. G. H. I. J.

Destination MAC Address Source MAC Address 802.1Q Tag EtherType/Length IP ToS Source IP Address Destination IP Address IP Protocol Source Port Destination Port

Answer: D Section: (none) Explanation/Reference:

QUESTION 71

Click the Exhibit button.

A network administrator is concerned about guests spoofing a server's IP address and getting access to resources that are not permitted to guests. The administrator has decided to implement Dynamic IP lockdown on an HP E3500yl-24G switch. However, after the implementation, guests can no longer access the web server providing company information to those guests. Which command would solve the problem? A. B. C. D. E. F.

ip source-binding 1 10.1.1.200 00-1b-f2-3a-d4-f2 3 ip source-binding 1 10.1.1.100 00-1b-f2-3a-d4-f2 11 ip source-binding 1 10.1.1.201 00-1b-f2-3a-d4-f2 1 no ip source-lockdown 1-2 no ip source-lockdown 11 (eth-2)# dhcp-snooping trust

Answer: A Section: (none) Explanation/Reference:

QUESTION 72 Frame Relay is a Physical interface that can have multiple virtual circuits. What does the router use to determine which DLCI to use to reach each of its neighbors? (Select two) A. B. C. D. E.

ARP (Address Resolution Protocol) Static DLCI to IPV4 mapping RARP (Reverse Address Resolution Protocol) UARP (Unicast Address Resolution Protocol) InARP (Inverse Address Resolution Protocol)

Answer: BE Section: (none)

Explanation/Reference:

QUESTION 73 An administrator of a hotel wants to keep the guests of the hotel from communicating with each other on the hotel network. The network uses HP A5800 switches. They have successfully isolated each guest by implementing Port Isolation and adding all ports on the switch to the same Port Isolation group. However, the users cannot access the Internet. Which change should the administrator make to allow guests Internet access, while keeping them isolated from each other? A. B. C. D.

Move the Internet connection to another VLAN and implement routing. Remove the Internet port from the Port Isolation group. Define the Internet port as a trusted port. Create an ACL to permit the traffic to the Internet port.

Answer: B Section: (none) Explanation/Reference:

QUESTION 74 Click the Exhibit button.

What is indicated by the route entry of an HP E5400 zl switch shown in the exhibit? A. B. C. D.

The switch's neighbor on VLAN 165 is not available. The switch's VLAN 165 IP address is 192.168.1.1. VLAN 165 is the gateway to networks not in the switch's route table. All traffic dropped by ACLs will be redirected to VLAN 165.

Answer: C Section: (none) Explanation/Reference:

QUESTION 75 How does PIM-SM achieve load balancing? A. The BSR creates an RP-set (Rendezvous Point-set) that maps multicast groups to RPs, and floods the RP-set to the entire PIM-SM domain. B. Several Static-RPs (Static-Rendezvous Points) are configured in the domain, and the first hop router selects the closest RP. C. The first hop router sends an RP-request (Rendezvous Point-request) to the BSR, indicating the group address of the multicast flow. D. The first hop router has a list of all the RPs (Rendezvous Points) and distributes the multicast traffic among those with the lowest cost. Answer: A

Section: (none) Explanation/Reference:

QUESTION 76 A customer network has HP E5400 zl switches configured for routing. One specific switch is not configured for IP Multicast and receives a PIM Dense transmission. What is the effect? A. B. C. D.

The switch forwards the traffic through all ports. The switch forwards the traffic towards its default gateway. The switch drops the traffic. The switch does not forward the traffic to the default VLAN.

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 77 Click the Exhibit button.

The LAN shown in the exhibit is being designed as a single DiffServ domain. On which ports should the packets be remarked to comply with the DiffServ Model? A. inter-switch ports B. client access ports only C. server access ports only

D. client and server access ports Answer: D Section: (none) Explanation/Reference:

QUESTION 78 How does an IGMPv1 host become a group member? A. B. C. D.

by sending a Join message by sending a Graft message by sending a Member-request message by sending a Report message

Answer: D Section: (none) Explanation/Reference:

QUESTION 79 The output of show ip ospf link-state on an HP E5400 zl switch shows that the age of one Network Link State Advertisement (LSA) is 1814. How does the router use this information? A. The router ignores all LSAs from the downstream neighbors until they are updated. B. The router requests a new LSA from all of its neighbors' routers. C. The router places the advertised route in its route table even if it learns another route to the same network. D. The router ignores the advertisement when the Shortest Path First (SPF) algorithm runs. Answer: D Section: (none) Explanation/Reference:

QUESTION 80 After a MAD-enabled IRF stack splits, what happens to the part of the stack that entered Recovery state? A. All ports, except for the IRF-ports, BFD enabled ports, and console ports are shut down. B. All ports, except for the IRF-ports, LACP enabled Link aggregation groups, console ports, and manually excluded ports are shut down. C. All ports, except for the IRF-ports, console ports, and manually excluded ports, are shut down. D. All ports except for manually excluded ports are shut down. Answer: C Section: (none) Explanation/Reference:

QUESTION 81

You have an HP Networking Switch A5800 that has two configured VLANs. VLAN 100 has an IP address range of 10.1.100.0/24 and is where the servers reside. VLAN 36 has an IP address range of 10.1.36.0/24 and is where the network clients reside. You configure an ACL with the following entries:

When you apply this ACL statically to ports in VLAN 36, what is the effect on the clients located in VLAN 36? A. B. C. D.

They have no access because the ACL is misconfigured. They cannot access anything in the 10.1.100.0 subnet because IP has not been specified in the ACL. They are allowed only FTP, HTTPS, and SSH access to 10.1.100.10, but no access elsewhere. They are allowed full access to everything in the 10.1.100.0 subnet.

Answer: D Section: (none) Explanation/Reference:

QUESTION 82 How is VoIP more sensitive to network congestion than classic file and print data applications? A. B. C. D.

VoIP requires more speed than data applications. VoIP requires dedicated switched virtual circuits to provide adequate voice quality. VoIP depends on frequent multicast broadcasts to maintain location and inventory information. VoIP requires that packets be transmitted and received at predictable and fixed intervals.

Answer: D Section: (none) Explanation/Reference:

QUESTION 83 QinQ provides the capability of having two VLAN tags in a single frame, sometimes called "tag stacking." Which VLAN types does QinQ support? A. B. C. D.

2-VLAN and S-VLAN S-VLAN and M-VLAN S-VLAN and C-VLAN M-VLAN and C-VLAN

Answer: C Section: (none) Explanation/Reference:

QUESTION 84 Click the Exhibit button.

A frame belonging to VLAN 2 is transmitted from Switch A to Switch B. What happens to the frame? A. B. C. D.

It is assigned to VLAN1. It is assigned to VLAN 2. It is assigned to VLAN 3. It is discarded.

Answer: B Section: (none) Explanation/Reference:

QUESTION 85 An administrator has been tasked with implementing a static port ACL on an HP E5400 zl Series switch. Which statements are true? (Select two.) A. B. C. D. E.

Static port ACLs can be added to statically configured link aggregation groups. The ACL can be conditionally assigned to a port, based on the connecting device's MAC address. Static port ACLs can only be implemented as extended ACLs. Static port ACLs are used when clients with differing access needs are likely to use the same port. The ACL can filter any inbound IP traffic on the designated port, regardless of whether it is switched or routed.

Answer: AE Section: (none) Explanation/Reference:

QUESTION 86 Which risk does an unpatched endpoint present to your system? A. B. C. D.

The endpoint is at higher risk of infection by a worm or infiltration by a hacker. The endpoint cannot be scanned by an endpoint integrity solution. The endpoint is more susceptible to brute force and dictionary attacks. The endpoint cannot be protected by your network access control solution.

Answer: A Section: (none) Explanation/Reference: Explanation:

QUESTION 87 Click the Exhibit button.

The network shown in Exhibit 1, with the configuration shown in Exhibit 2, is not working. Why? A. B. C. D.

Routers A and C do not have the "IP Address to DLCI" mapping. Router B does not have the FR interfaces configured as DCE. Router B does not have the FR interfaces configured as NNI. Router B has no IP addresses on its serial interfaces 4/0 and 4/1.

Answer: B Section: (none)

Explanation/Reference: Explanation:

QUESTION 88 Match each term with its definition.Terms

Answer:

Section: (none) Explanation/Reference:

QUESTION 89 A company's help desk requests access to the web interface of various networking devices. The network administrator decides to implement a secure web interface using SSL. Which step is necessary to complete this task on an HP A5800 switch? A. import the certificate authority's certificate B. configure RADIUS for user login C. generate a self-signed certificate

D. enable SSH Answer: A Section: (none) Explanation/Reference:

QUESTION 90 When the following command is entered at the CLI of an HP E5406 zl switch, what is the primary result? E5406(config)# spanning-tree priority 1 A. B. C. D.

The switch's global MST priority is set to 8192. The switch's CIST priority is set to 4096. The switch is elected Root Bridge of MST instance 1. The switch is configured to be Root Bridge of all MST instances defined on the switch.

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 91 How does the HP Networking Adaptive EDGE Architecture support convergence? A. B. C. D.

by supporting IEEE 802.1Q switch-to-switch only connections by supporting a variety of Layer 3 protocols only in the core of the network by enhancing edge compression of voice and video streams by supporting enhanced traffic prioritization at the edge of the network

Answer: D Section: (none) Explanation/Reference:

QUESTION 92 Why should the HP E5400 zl switch's BPDU Protection feature be enabled on a port? A. B. C. D.

to stop the port from receiving BPDUs to send topology change when a port's link status changes to configure the port as the root port in the Spanning Tree to enable Spanning Tree on the port

Answer: A Section: (none) Explanation/Reference:

QUESTION 93 What is required to define an OSPF router as an ABR? (Select two.)

A. B. C. D. E.

OSPF redistribution must be enabled in the OSPF configuration context. Different OSPF interfaces must be defined with at least two area IDs. OSPF priority must be set to 1 for all non-backbone interfaces. The backbone must be deleted. Two or more area IDs must be defined within the OSPF configuration context.

Answer: BE Section: (none) Explanation/Reference: Explanation:

QUESTION 94 Consider the ACLs and the packet descriptor provided below:

Which QoS traffic classifier does this packet match? A. traffic classifier class1 operator and if-match customer-dot1p 6 if-match acl 2001 if match acl "Pass Any Exam. Any Time." - 100% Pass Guarantee 44 HP HP0-Y31: Practice Exam B. traffic classifier class3 if-match customer-dot1p 0 if-match acl 2001 if-match acl 3001 C. traffic classifier class4 if-match customer-dot1p 0 if-match dscp 52 if-match acl 2001 D. traffic classifier class2 operator or if-match customer-dot1p 2 if-match acl 2001 if-match acl Answer: D Section: (none) Explanation/Reference:

Explanation:

QUESTION 95 Which advantages do converged networks offer? (Select two.) A. B. C. D. E.

automatic support for IPv4 and IPv6 simplified adds, moves, and changes enhanced bandwidth for voice transmissions lowered costs for switches and routers integrated support for voice, video, and data

Answer: BE Section: (none) Explanation/Reference:

QUESTION 96 You are configuring an HP E5400 zl switch for IPv6 to be used as a core router. When you configure VLAN 1 with a specific IPv6 global unicast address, which other IPv6 features are automatically configured on VLAN 1? (Select two.) A. B. C. D. E.

VLAN 1 is enabled for IPv6 routing. VLAN 1 is assigned a link-local unicast address. VLAN 1 requires an additional IPv6 command in order to operate. VLAN 1 is enabled for IPv6 operation. VLAN 1 is assigned a global-link unicast address.

Answer: BD Section: (none) Explanation/Reference: Explanation:

QUESTION 97 What does an OSPF DD (Database Description) packet carry? A. B. C. D.

LSA requests LSAs LSA headers Peer Router-IDs

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 98 Click the Exhibit button.

What is the recommended configuration of OSPF in Router A1 to reach the networks within AS 65101? A. B. C. D.

ospf 1 import bgp ospf 1 area 0 network 10.2.0.0 0.0.0.255 route-static 10.2.0.0 16 10.1.1.2ospf 1 import static route-static 0.0.0.0 0 10.1.1.2ospf default-route-advertise

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 99 VLAN ACLs (VACLs) can be used to filter traffic on an HP E5400 zl switch. Which traffic is inspected? A. B. C. D.

IP traffic entering a physical port, port list, or static trunk IP traffic routed between different subnets of the same VLAN IP traffic switched between ports belonging to the same VLAN IP traffic routed between different VLANs

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 100

What is a benefit of defining multiple OSPF areas in a large intranet? A. B. C. D.

It enables routers to communicate indirectly with the backbone. It provides multiple paths from internal routers to ASBRs and ABRs. It reduces the total number of LSAs managed by internal routers. It reduces the processing load on internal ABRs.

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 101 There are a number of configuration parameters available when configuring Dynamic ARP Protection on an HP E5400 zl switch. Which steps are required? (Select three.) A. B. C. D. E. F. G. H.

Define trusted ports. Allocate the IP-to-MAC address binding database. Enable Dynamic ARP Protection globally. Activate Dynamic ARP Protection on one or more VLANs. Enable validation of source MAC addresses. Enable IP routing Specify the valid MAC address formats supported. Enable MAC Lockdown.

Answer: ACD Section: (none) Explanation/Reference:

QUESTION 102 Which router in a PIM-Dense routing domain is the root node of a multicast distribution tree? A. B. C. D.

Bootstrap Router Rendezvous Point router where all IGMP hosts are located router closest to the multicast source

Answer: D Section: (none) Explanation/Reference: Explanation:

QUESTION 103 Click the Exhibit button.

At this switch prompt, you enter qos dscp 010110, a DSCP codepoint that maps to an IEEE 802.1p priority value of 3. What is the effect of this command? A. B. C. D.

The command has no effect because the higher priority takes precedence. The current VLAN 75 priority of 6 is replaced with a new priority of 3. The DSCP codepoint is re-mapped to 802.1p priority 6 for VLAN 75. The Layer 2 and Layer 3 priorities for VLAN 75 are different.

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 104 When using DHCP Snooping on an HP E5400 zl switch, which action can the switch perform if a client sends a DHCP message with option 82 set? A. B. C. D. E.

It marks the source client as untrusted and forwards it to an untrusted DHCP server. It replaces the field with the switch's IP address and the source port identifier. The switch does not understand option 82 and drops the DHCP message. It authenticates the DHCP message and forwards it if the client is attached to a trusted port. It moves the client to a quarantine VLAN for further threat detection.

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 105 Which sampling mechanisms are available in sFlow in A-Series switches and routers? (Select two.) A. B. C. D. E. F.

packet-based packet-length-based time-based ip-protocol-based ip-source-address-based mac-address-based

Answer: AC Section: (none)

Explanation/Reference: Explanation:

QUESTION 106 Normally a switch will only forward network traffic based on the destination MAC address. Occasionally it is desirable to have traffic copied and sent to an additional location. Which sources can be specified for the HP E5400 zl switch Traffic Mirroring feature? (Select three.) A. B. C. D. E. F.

network port LLDP-MED identifier console port VLAN trunk port group

Answer: ADE Section: (none) Explanation/Reference: Explanation

QUESTION 107 The network administrator of an HP E5400 zl switch realizes that employees are connecting wireless access points and small-scale switches to the network. The administrator wants to limit a particular port to one MAC address at a time, but is not concerned about the actual address. Which security feature provides flexibility while effectively limiting a port to a single MAC address at a time? A. B. C. D.

MAC Lockout learn mode static MAC Lockdown learn mode continuous 802.1X MAC authentication Port Security learn mode limited-continuous

Answer: D Section: (none) Explanation/Reference: Explanation:

QUESTION 108 You are designing a network that will operate only with IPv6. The design calls for core and distribution routing support. You specify the HP E5400 zl switches' configuration parameters. In the VLAN 100 configuration context you defined the following configuration statement:ipv6 nd ra suppress What is the purpose of this command? A. B. C. D.

provides minimal router advertisements on VLAN 100 provides no router advertisements on VLAN 100 provides router advertisements at regular intervals on all VLANs except VLAN 100 provides router advertisements only on VLAN 100

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 109 Which default gateway redundancy protocol is supported on HP E5400 zl switches? A. B. C. D.

XRRP HSRP VRRP FSRP

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 110 You are a network engineer for an ISP supporting multiple customers, each having multiple sites. Most of these customers require their VLANs to span the site-to-site connections through your provider network. You have decided that QinQ would best serve your customers' needs. Which QinQ operation mode should you select for your HP E5400 zl switches that support these customers? A. B. C. D.

QinQ cvlan QinQ multivlan QinQ mixedvlan QinQ svlan

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 111 Click the Exhibit button.

The router shown in the exhibit is receiving the same multicast traffic through three of its interfaces (S5/0, S5/1 and, S5/2). Based on the tables shown below, which interface is chosen as the RPF interface for (S, G)?IP Interface Table (Partial)Routing table (Partial) A. B. C. D.

G0/0 S5/0 S5/1 S5/2

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 112 Which OSPF network type requires the configuration of the peer IP address? A. B. C. D.

Broadcast NBMA P2P P2MP

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 113 While configuring two HP E5400 zl switches, you enable VRRP on the Backup router, then you plan to enable VRRP on the Owner router at a later date. Which possible effect will this action cause on the network at that later date? A. No default gateway is available until VRRP is enabled on the Owner router. B. The Backup router will send out error advertisements when it does not find the Master router. C. The Owner router will not assume the Master role until the Backup router is restarted after VRRP is enabled on the Owner router. D. Users will experience a brief interruption when VRRP is enabled on the Owner router. Answer: D Section: (none) Explanation/Reference:

QUESTION 114 You are configuring DHCP Snooping on an HP E5400 zl switch with multiple VLANs that use the same DHCP server. Which value would typically be specified for the option 82 remote ID parameter? A. B. C. D. E.

base MAC address management IP address MAC address of the client subnet IP address of source VLAN the requested IP address

Answer: D Section: (none) Explanation/Reference:

QUESTION 115 You connect a VoIP telephone that supports LLDP-MED and 802.1X authentication to a port on an HP E5400 zl switch. The port is a member of the voice VLAN and is configured for 802.1X authentication. How will LLDP-MED and 802.1X interact when the phone is fully connected to the switch? A. The switch will use information from the phone's first LLDP-MED frame to submit its authentication credentials. B. The switch will submit the phone's authentication credentials to a TACACS server after the devices exchange LLDP-MED information. C. The switch will exempt the phone from the 802.1X authentication requirement after confirming its LLDPMED information that it is an actual VoIP phone. D. The switch will permit LLDP-MED communication with the phone after 802.1X authentication has been verified by the switch. Answer: D Section: (none) Explanation/Reference: Explanation:

QUESTION 116 You are designing a network for a mid-sized company. During one of the planning meetings you learn that the customer will be installing VoIP phones that set Layer 2 priority markers for all voice traffic. The VoIP traffic will also cross routed links to the branch offices. Which configuration features are required to ensure that the HP E5400 zl switches maintain the priorities set by the VoIP phones? (Select three.) A. B. C. D. E. F.

untagged links for all voice VLAN traffic GMB settings for voice traffic DiffServ prioritization tagged links for all voice VLAN traffic rate limiting on all ports that support VoIP phones an IEEE 802.1p-to-DSCP map for all voice traffic

Answer: CDF Section: (none) Explanation/Reference: Explanation:

QUESTION 117 What is a benefit of the HP E5400 zl switch BPDU Filtering feature? A. It allows you to permit or deny selected user traffic on individual Spanning Tree ports. B. It is used to block a port when a BPDU is received. C. It prevents a port from being part of a Spanning Tree topology that may otherwise cause a topology loop. D. It controls Spanning Tree operation on selected ports that you do not want to participate in Spanning Tree communications. Answer: D Section: (none) Explanation/Reference:

QUESTION 118 What is an advantage of Multiple Spanning Tree Protocol (MSTP) compared to Rapid Spanning Tree Protocol (RSTP)? A. B. C. D.

MSTP provides better support for legacy STP. MSTP is directly compatible with PVST+. MSTP provides faster convergence when the root bridge becomes unavailable. MSTP provides the option to use all switch-to-switch links.

Answer: D Section: (none) Explanation/Reference: Explanation:

QUESTION 119 Click the Exhibit button.

Which BGP attribute should be used in AS 65100 to give router A1 a higher priority than router A3 for traffic leaving the AS? A. B. C. D.

Origin MED AS-Path Local Preference

Answer: D Section: (none)

Explanation/Reference:

QUESTION 120 When does an IPv6 host send Neighbor Advertisement messages on the network? A. B. C. D.

every 30 seconds when an RS is received when an NS is received only on power up

Answer: C Section: (none) Explanation/Reference:

QUESTION 121 Why are IP and Ethernet fundamental technologies for converged networks? (Select two.) A. B. C. D. E.

They offer very high levels of security. They are only available on Intel-based computers. They are not disrupted by power outages. They offer long-used and mature standards. They are widely deployed in LANs.

Answer: DE Section: (none) Explanation/Reference: Explanation:

QUESTION 122 Which authentication protocol is always initiated by the supplicant? A. B. C. D.

Password Authentication Protocol (PAP) Challenge-Handshake Authentication Protocol (CHAP) Microsoft CHAP version 2 (MS-CHAPv2) Extensible Authentication Protocol (EAP)

Answer: A Section: (none) Explanation/Reference: Explanation:

QUESTION 123 Click the Exhibit button.

A network administrator is concerned about guests spoofing a server's IP address and getting access to resources that are not permitted to guests. The administrator has decided to implement Dynamic IP lockdown on an HP A5800 switch. However, after the implementation, guests can no longer access the web server providing company information to those guests. Which command would solve the problem? A. B. C. D.

[A5800-GigabitEthernet1/0/3] user-bind ip-address 10.1.1.200 mac-address 0001-0203-0405 [A5800-GigabitEthernet1/0/3] undo ip check source [A5800-GigabitEthernet1/0/3] dhcp-snooping trust 10.1.1.200 [A5800] dhcp-snooping trust 10.1.1.200

Answer: A Section: (none) Explanation/Reference: Explanation:

QUESTION 124 Match each traffic type with its description.

Answer:

Section: (none) Explanation/Reference:

QUESTION 125 With the MAC address 00:16:ea:8e:5b:de, what is the EUI-64 derived 64-bit interface ID? A. 0016:ea8e:5bde:fffe B. 0016:eaff:fe8e:5bde C. 0216:ea8e:5bde:fffe

D. 0216:eaff:fe8e:5bde Answer: D Section: (none) Explanation/Reference: Explanation:

QUESTION 126 When the following command is issued at the CLI of an HP E5400 zl switch at factory default settings, which Spanning Tree version is enabled?E5406(config)# spanning-tree A. B. C. D.

STP+ PVST+ MSTP RSTP

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 127 You are implementing a new network infrastructure using only IPv6 on HP 5400 zl switches. You currently have two switches connected to each other, each configured with only the default VLAN, and IPv6 is enabled. The IPv6 address of the switch you want to ping is fe80::223:47ff:fec1:6140. When you enter the ping6 command to ping that switch, you get an error message. What is the correct syntax to ping a connected host's link-local unicast address from the switch you have a console connection? A. B. C. D.

ping6 fe80::223:47ff:fec1:6140 vlan 1 ping6 fe80::223:47ff:fec1:6140 ping fe80::223:47ff:fec1:6140%vlan ping6 fe80::223:47ff:fec1:6140%vlan1

Answer: D Section: (none) Explanation/Reference: Explanation:

QUESTION 128 Which mechanism enables two parties to agree on a symmetric key on their own without transmitting it over the network? A. B. C. D.

Kerberos Key Distribution Center (KDC) Diffie-Hellman exchange Public Key Infrastructure (PKI)

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 129 Which protocols/technologies can be used to implement IRF MAD? (Select two.) A. B. C. D. E.

NSF/GR ICMP IGMP BFD LACP

Answer: DE Section: (none) Explanation/Reference: Explanation:

QUESTION 130 What is one difference between TACACS+ and RADIUS? A. B. C. D.

TACACS+ supports authentication, authorization, and accounting. RADIUS provides options for setting the level of access a user logging into a switch interface receives. TACACS+ can be more stable because it uses a connection-based transport protocol. RADIUS cannot be implemented with Extended Authentication Protocol.

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 131 What is a disadvantage of locating intelligent routing only in the core of an enterprise network, rather than also at the edge of the network? A. The core-oriented strategy does not support VRRP or MSTP for default gateway redundancy. B. The core-oriented strategy requires fewer VLANs distributed across the core and edge routers than the edge-oriented strategy. C. The core-oriented strategy is less efficient because traffic has already traversed the network before the routing decisions are made. D. The core-oriented strategy requires more configuration steps than the edge-oriented strategy. Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 132 You are troubleshooting a network problem relating to specific traffic on a customer network. While analyzing network traffic, you observe that many packets have an IEEE 802.1p value of 1. On an HP E5400 zl switch with default settings, what does this indicate? A. The network is not using default settings on the switches. B. No prioritization settings are configured on any of the switches in the network.

C. The network relies on the DSCP Layer 3 classification technologies. D. The traffic will be mapped to the low priority queue of the switches. Answer: D Section: (none) Explanation/Reference: Explanation:

QUESTION 133 You are designing a network using HP E5400 zl switches that require support for IPv6 and OSPFv3. You have already configured the IPv6 addressing structure. Before you enable OSPFv3, which additional command is required to support OSPFv3 routing? A. B. C. D.

ip router ospfv3 enable ip router-id 1.2.3.1 ip unicast routing ip ospf3 unicast-routing

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 134 You are configuring IP multicast on a customer network that has all HP E5400 zl switches installed. All VLANs have been created, and IP addresses and OSPF have been assigned to all routed interfaces. IGMP has been enabled for all VLANs that will support multicast hosts. To enable PIM, you issue the following commands:E5406(config)# ip multicast-routingE5406(config)# router pim. What is the remaining step you must take in this process? A. B. C. D.

Enable PIM for every VLAN that will support Layer 3 multicast. Enable IGMP at the global configuration level. Enable PIM only on VLAN interfaces that lead to other routers. Enable sparse mode for every VLAN that will support Layer 3 multicast.

Answer: A Section: (none) Explanation/Reference: Explanation:

QUESTION 135 Click the Exhibit button.

While onsite configuring an HP E5400 zl switch, you enter ipv6 enable in VLAN 1 configuration context. You type the command show ipv6 at the switch CLI, and receive the result shown in the exhibit. What is meant by the Address Status column? A. B. C. D.

The switch has secured its IPv6 address. The switch is waiting for DAD to verify its IPv6 address. The switch is waiting for an additional configuration command to be entered. The switch is waiting for a router advertisement to verify its IPv6 address.

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 136 An administrator of a network of A5800s has found evidence that an unauthorized device is gaining access to the network. All the administrator knows about the device is its MAC address. Assuming that the action she takes does not require special actions for guest devices, what can she do to keep the device from connecting to the network? A. Implement MAC authentication B. Lock out the MAC for the device, using the mac-address command C. Lock out the MAC for the device, and statically assign the device to the 'null' interface using the staticmac command D. Implement Port Security in the autoLearn mode Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 137 Which statement is true about the HP E5400 zl switch Connection-rate Filtering feature? A. B. C. D.

Any outbound traffic destined for a host that has been throttled or blocked is permitted. When enabled, it is automatically globally activated. It uses sFlow traffic sampling to determine whether traffic activity represents an intrusion. It detects threats with both a signature-based engine and an anomaly-based engine that can detect zero day attacks.

Answer: A Section: (none) Explanation/Reference: Explanation:

QUESTION 138 An administrator needs to create an ACL to block traffic from 192.168.10.23 to all destinations. Which type of ACL can be used to meet this need? A. a standard ACL applied as Routed ACL (RACL) B. an extended ACL applied as a Routed ACL (RACL)

C. a standard ACL applied as a VLAN ACL (VACL) D. a standard ACL applied as a dynamic ACL Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 139 You are designing a network for a customer, and one of the requirements is to support multicast traffic. When defining configuration steps for the HP E5400 zl switches, when will both PIM and IGMP need to be configured? A. B. C. D.

when multicasts have multiple sources when multicasts need to be routed when multicasts have high usage among end users when multicasts need to support large bandwidth

Answer: B Section: (none) Explanation/Reference: Explanation:

QUESTION 140 In A-Series switches, which VLAN types require the command local-proxy-arp enable for all the stations in the VLAN to be able to communicate to each other at Layer 3? (Select two.) A. B. C. D. E. F.

Port-based VLAN SuperVLAN Protocol-based VLAN IP-subnet-based VLAN MAC-address-based VLAN Isolate-user VLAN

Answer: BF Section: (none) Explanation/Reference: Explanation:

QUESTION 141 While troubleshooting a network issue, the output of show spanning-tree instance 2 on two HP E5400 zl switches indicates that each switch is the Root of MST instance 2. Which statement explains this output? A. B. C. D.

The switches have different MST config-revision numbers. The switches have the same Bridge Priority configuration. The switches have identical Port Priorities for ports associated with the instance. The switches have been configured for RSTP operation.

Answer: A Section: (none) Explanation/Reference:

Explanation:

QUESTION 142 Which type of authentication factor is most vulnerable to being obtained by a hacker without the knowledge of the legitimate user? A. B. C. D.

password USB token smart card biometric

Answer: A Section: (none) Explanation/Reference:

QUESTION 143 You are troubleshooting an issue where hosts are not obtaining their DHCPv6 addresses. You check the HP E5400 zl switch config and observe the ipv6 helper address is defined on the user VLAN, as well as the appropriate M and O bit parameters. However, trace analysis indicates that the switch is not sending the DHCPv6 request out the VLAN where the DHCPv6 server is located. Which additional configuration parameter is required on the HP 5400 zl switch in order to support DHCPv6? A. B. C. D.

E5406(config)# dhcp-relay E5406(config)# ipv6 helper-address E5406(config)# dhcpv6-relay E5406(config)# ipv6 dhcpv6-relay

Answer: C Section: (none) Explanation/Reference: Explanation:

QUESTION 144 Match each QoS mechanism with its description.

Answer:

Section: (none) Explanation/Reference: